Configure Virtual Private Networking (VPN)
About Internet Protocol Security (IPSec)
Digi TransPort WR Routers User Guide
402
About Internet Protocol Security (IPSec)
An inherent problem with the TCP protocol for carrying data over the vast majority of LANs and the
Internet is that it provides virtually no security features. This lack of security, and publicity about
hackers and viruses, prevent many people from even considering using the Internet for any
sensitive business application. IPSec provides a remedy for these weaknesses adding a
comprehensive security layer to protect data carried over IP links.
IPSec (Internet Protocol Security) is a framework for a series of IETF standards designed to
authenticate users and data, and to secure data by encrypting it during transit.
Benefits of IPSec
IPSec is provides confidentiality, integrity, and authentication in the transport of data across
inherently insecure channels.
When properly configured, IPSec provides a highly secure virtual channel across cheap, globally
available networks such as the Internet, or creates a “network within a network” for applications
such as passing confidential information between two users across a private network.
Protocols defined within IPSec
The protocols defined within IPSec include:
▪
IKE
: Internet Key Exchange protocol
▪
ISAKMP
: Internet Security Association and Key Management Protocol
▪
AH
: Authentication Header protocol
▪
ESP
: Encapsulating Security Payload protocol
▪
HMAC
: Hash Message Authentication Code
▪
MD5
: Message Digest 5
▪
SHA-1
: Security Hash Algorithm
Cryptographic (encryption) techniques include:
▪
DES
: Data Encryption Standard
▪
3DES
: Triple DES
▪
AES
: Advanced Encryption Standard (also known as Rijndael)
Two key protocols within the framework are AH and ESP. AH authenticates users, and ESP applies
cryptographic protection. The combination of these techniques is designed to ensure the integrity
and confidentiality of the data transmission. Put simply, IPSec is about ensuring that:
▪
Only authorized users can access a service.
▪
No one else can see what data passes between one point and another.
IPsec operation modes
There are two modes of operation for IPSec, transport mode and tunnel mode.
▪
In transport mode, only the payload (such as the data content), of the message is encrypted.
▪
In tunnel mode, the payload and the header and routing information are all encrypted thereby
by providing a higher degree of protection.
Summary of Contents for TransPort WR11
Page 1: ...User Guide Digi TransPort WR Routers ...
Page 650: ...Configure system settings NTP parameters Digi TransPort WR Routers User Guide 650 ...
Page 661: ...Configure system settings General system parameters Digi TransPort WR Routers User Guide 661 ...
Page 662: ...Configure system settings General system parameters Digi TransPort WR Routers User Guide 662 ...
Page 663: ...Configure system settings General system parameters Digi TransPort WR Routers User Guide 663 ...
Page 682: ...Configure Remote Management SNMP parameters Digi TransPort WR Routers User Guide 679 ...
Page 683: ...Configure Remote Management SNMP parameters Digi TransPort WR Routers User Guide 680 ...
Page 813: ...Manage networks and connections Top Talkers Digi TransPort WR Routers User Guide 808 ...
Page 814: ...Manage networks and connections Top Talkers Digi TransPort WR Routers User Guide 809 ...
Page 815: ...Manage networks and connections Top Talkers Digi TransPort WR Routers User Guide 810 ...
Page 816: ...Manage networks and connections Top Talkers Digi TransPort WR Routers User Guide 811 ...
Page 817: ...Manage networks and connections Top Talkers Digi TransPort WR Routers User Guide 812 ...
Page 818: ...Manage networks and connections Top Talkers Digi TransPort WR Routers User Guide 813 ...
Page 855: ...Device administration Reboot the router Digi TransPort WR Routers User Guide 844 ...